Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes

2015 ◽  
Vol 5 (3) ◽  
pp. 35-52 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.

2016 ◽  
pp. 1205-1222
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2019 ◽  
pp. 889-902
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


2016 ◽  
Vol 7 (3) ◽  
pp. 86-98 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

Cloud computing is considered a great paradigm that enables access to large scale, on demand, flexible computing infrastructure. Lower infrastructure cost and better application performance are some of the benefits of utilizing a cloud computing model. With the appearance of the new generation of multi-cloud computing, clients can benefit from a diversity of services. However, data security has become an important requirement for clients when dealing with clouds that may fail due to faults in the software or hardware, or attacks from malicious insiders. Hence, building a highly dependable and reliable cloud system has become a critical research problem. To that end, this chapter investigates and presents the results in relation to that how Byzantine fault tolerance (BFT) and secure cloud data storage and sharing techniques can be deployed to manage multi-cloud data dependability faults.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 307
Author(s):  
K Ruth Ramya ◽  
D N.V.Saikrishna ◽  
T Sravya Nandini ◽  
R Tanmai Gayatri

Cloud computing the most emerging data storage and processing technology. Today many organizations are using cloud-based data storage because of their complex data management. Even though cloud is attracting many users towards using it but there is a requirement of security concerns to be taken care of because cloud is untrusted, the data which individual stores on cloud will be transparent to cloud administrator also which may be confidential. So, while using cloud security is the primary concern. In this paper, we proposed a scheme to encrypt cloud data using user attribute-based encryption. Which is a public key crypto technique in which key will be based on the attributes of user. The attributes we used are biometrics of user who is going to upload the data.  


2012 ◽  
Vol 2 (3) ◽  
pp. 1-25 ◽  
Author(s):  
P. Syam Kumar ◽  
Marie Stanislas Ashok ◽  
R. Subramanian

Data storage is an important application of cloud computing, where the users can remotely store their data into the cloud. This new paradigm of data storage service also introduces security challenges, such as Confidentiality, Integrity and Availability of data. The protection of these issues in cloud is a very challenging and potentially formidable task, especially for the users with constrained resources. Therefore, an independent auditing service is required to address these issues of data stored in the cloud. The existing schemes may not scale well for this purpose. This paper proposes a publicly verifiable dynamic secret sharing scheme for the Availability, Integrity and Confidentiality of data. Their scheme takes advantages of both Secret Sharing and Tornado code which can achieve the computational security and maintain low communication overhead in terms of shortened data dispersing size. The authors’ model gives probabilistic proofs of Integrity of data by challenging random blocks from the server to reduce the computation and communication overhead, and also supports dynamic data operations to data shares in cloud using index table. Through extensive security analysis, their scheme can provide secure, dependable, and publicly verifiable cloud data storage in the Cloud against threats. Through the performance and experimental results, the authors prove that their scheme is efficient than existing schemes.


2014 ◽  
Vol 614 ◽  
pp. 468-471
Author(s):  
Yue Ling Zhang ◽  
Gang Xu ◽  
Jiang Tao Wang

This paper is aimed to maximize computing resources and improve performances of CMEP by using REST style cloud management interfaces to operate data, using open authentication constructor to validate requests, designing schedule algorithms and distributing cloud computing based on executing and user’s purchase situation. Experiments showed that, high performance cloud data management would significantly shorten response time, expand erupt simultaneously count and scalability.


2020 ◽  
Vol 5 (17) ◽  
pp. 6-10
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

This paper explores different security aspects in cloud computing environment. It includes data sharing mechanism, inter cloud communication, data breaches, data control, user-cloud relationship along with the cloud data management with standard security algorithms. It also covers the related reviews and analytical analysis on the traditional approaches for the gap identification. So, a short meta-analysis has been presented based on the method discussed along with the advantages and challenges found. It also explores the future prospective where there is the need of exploration and research.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document